Collection of Offensive C# Tooling
☆13Nov 4, 2021Updated 4 years ago
Alternatives and similar repositories for OffensiveCSharp
Users that are interested in OffensiveCSharp are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆12Jan 21, 2020Updated 6 years ago
- Example of async client/server sockets in .NET 5☆17Jun 9, 2021Updated 4 years ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆12Jul 15, 2022Updated 3 years ago
- A repository with my notable code snippets for Offensive Security's PEN-300 (OSEP) course.☆10Aug 2, 2021Updated 4 years ago
- string/file/shellcode encryptor using AES/XOR☆11Oct 15, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Exploits written while preparing for the OSED exam☆25Apr 30, 2024Updated last year
- Dynamically invoke arbitrary unmanaged code from managed code without P/Invoke.☆171Jan 25, 2024Updated 2 years ago
- Rasta's mouse AMSI patch but with function that makes it undetectable.☆14Apr 21, 2021Updated 4 years ago
- ☆14Feb 4, 2024Updated 2 years ago
- Direct syscalls Injection to bypass AV/EDR☆11May 18, 2024Updated last year
- Download a .NET payload and run it on memory☆70Apr 12, 2019Updated 6 years ago
- a basic IDE compiler for C# and VB.NET using codedom☆45Sep 22, 2019Updated 6 years ago
- ☆14Jun 22, 2022Updated 3 years ago
- HTML smuggling is not an evil, it can be useful☆14Jan 28, 2023Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Cobalt Strike random C2 Profile generator☆16Updated this week
- Allows a user to grab documentation from online MSDN for a given function name in IDA, and import the documentation as a repeatable comme…☆15Jul 22, 2012Updated 13 years ago
- Custom mini tools during Red Teaming engagements☆24Mar 7, 2026Updated last month
- Enter Product Key Volatile Environment LPE☆13Jun 28, 2025Updated 9 months ago
- Exploits developped by Outflank B.V. team members☆21Jan 26, 2017Updated 9 years ago
- Python script to run battery of Volatility plugins against a forensic memory image☆10Jun 22, 2019Updated 6 years ago
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆28Sep 18, 2024Updated last year
- Simple class to search and upload files☆28Aug 13, 2019Updated 6 years ago
- A bot designed to track rewards and manage PocketNetwork nodes☆11Apr 14, 2022Updated 3 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- ☆33Jan 23, 2025Updated last year
- TaskMgr Volatile Environment LPE☆16Jun 28, 2025Updated 9 months ago
- Tracking position of any Wifi capable device.☆11May 6, 2020Updated 5 years ago
- Bypass AMSI by patching AmsiScanBuffer☆283Jun 4, 2021Updated 4 years ago
- Simple python script to evade antiviruses on fully patched and updated Windows environments using a py2exe.☆20Oct 24, 2022Updated 3 years ago
- ☆11Apr 20, 2023Updated 2 years ago
- Fast asynchronous DNS Scanner/bruteforcer☆18Jun 11, 2011Updated 14 years ago
- ☆299Mar 31, 2022Updated 4 years ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆37Oct 28, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- NativePayload_CallBackTechniques C# Codes (Code Execution via Callback Functions Technique, without CreateThread Native API)☆118Jun 7, 2023Updated 2 years ago
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆13Jun 6, 2023Updated 2 years ago
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆32Oct 30, 2021Updated 4 years ago
- Download a payload and make it run from registry without droppng.☆110Apr 9, 2019Updated 7 years ago
- Python CLI covering the FileScan.IO API - enabling automatic interaction with www.filescan.io or private instances☆18Jul 15, 2025Updated 8 months ago
- Active Directory Group Policy analyzer☆18Sep 20, 2019Updated 6 years ago
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defender☆23Nov 20, 2022Updated 3 years ago